71
CRIME FILE SYSTEM CONTENTS DETAIL PAGE 1. INTRODUCTION 2 2. SYSTEM ANALYSIS 6 2.1 Introduction to system analysis 2.2 Existing System 2.3 Proposed System 2.3.1. Feasibility Study 2.4 Data Flow Diagram 3.SYSTEM DESIGN 16 3.1 Input design 3.2 Output design 3.3 Form design 3.4 Database design 4. SYSTEM IMPLEMENTATION 31 4.1 About Language 4.2 System Configuration 5. APPENDIX 43 5.1 Source Code 6. IMPLEMENTATION AND TESTING 50 1

Edited Copy Crime File System

Embed Size (px)

Citation preview

CRIME FILE SYSTEM

CONTENTS

DETAIL PAGE1. INTRODUCTION 22. SYSTEM ANALYSIS 6

2.1 Introduction to system analysis

2.2 Existing System

2.3 Proposed System

2.3.1. Feasibility Study

2.4 Data Flow Diagram

3.SYSTEM DESIGN 163.1 Input design3.2 Output design3.3 Form design3.4 Database design

4. SYSTEM IMPLEMENTATION 314.1 About Language4.2 System Configuration

5. APPENDIX 43 5.1 Source Code

6. IMPLEMENTATION AND TESTING 507. FUTURE ENHANCEMENT 548. CONCLUSION 559. BIBLIOGRAPHY 56

1

CRIME FILE SYSTEM

1. INTRODUCTION

2

CRIME FILE SYSTEM

Crime File System is a system used to report crimes. This project will be done using

VB 6.0 as front end, and MS Access as back end. It can used to report crime. This

project is mainly useful for police stations. This system will help to manage all the

activities in a police station using computers. Currently all the works are done

manually, by computerizing all the activities inside a police station can be managed

easily and effectively.

The modules involved in this project are:

Login for user and admin

Complaint registration

View complaint status

Criminal register management

FIR Management

Case History Details management

Managing Postmortem details

Prisoners register management

Manage list about most wanted criminals

1. LOGIN

This includes Administrator and User login. There will be a username and

password to login into the system to use all the facilities.

3

CRIME FILE SYSTEM

2. COMPLAINT REGISTRATION

This module helps to register the details about the crime. This is done by

entering some details, such as incident details, Victim details, crime details etc

3. VIEW COMPLAINT STATUS

This module allows us to view the status of the complaint that you have

registered earlier.

4. CRIMINAL REGISTER MANAGEMENT

Here we can have the facility to view the details of the criminals. The

administrator can add new criminal’s details and save it in a database. This can be

done by entering details such as criminal number, age, occupation, type of crime etc.

5. FIR MANGEMENT

This module allows viewing the First Information Report of all the crimes that

took place at recent years. The administrator can enter FIR information and save it in

a database.

6. CASE HISTORY DETAILS MANAGEMENT

Here we can view the details of the case, date of occurrence, the type of

crime and place of occurrence etc…

7. MANAGING POSTMORTEM DETAILS

This module helps to view the postmortem details of a person. The details

such as date of death cause of death, name of the doctor etc.

4

CRIME FILE SYSTEM

8. PRISONER REGISTER MANGEMENT

This module helps the administrator as well as the user to store, view and

manage the details of the past and present prisoners.

9. MANAGE THE LIST OF MOST WANTED CRIMINALS

This is an additional feature added to this Software, which helps us to make

a quick search about the most wanted criminals. This helps to always keep track of

and identify a person quickly, who is a most wanted criminal.

5

CRIME FILE SYSTEM

2. SYSTEM ANALYSIS

6

CRIME FILE SYSTEM

2.1 Introduction to System Analysis

System analysis is a process of gathering and interpreting facts, diagnosing

problems and the information to recommend improvements on the system. It is a

problem solving activity that requires intensive communication between the system

users and system developers. System analysis or study is an important phase of any

system development process. The system is studied to the minutest detail and

analyzed. The system analyst plays the role of the interrogator and dwells deep into

the working of the present system. The system is viewed as a whole and the input to

the system are identified. The outputs from the organizations are traced to the

various processes. System analysis is concerned with becoming aware of the

problem, identifying the relevant and decisional variables, analyzing and synthesizing

the various factors and determining an optimal or at least a satisfactory solution or

program of action.

A detailed study of the process must be made by various techniques like

interviews, questionnaires etc. The data collected by these sources must be

scrutinized to arrive to a conclusion. The conclusion is an understanding of how the

system functions. This system is called the existing system. Now the existing system is

subjected to close study and problem areas are identified. The designer now

7

CRIME FILE SYSTEM

functions as a problem solver and tries to sort out the difficulties that the enterprise

faces. The solutions are given as proposals. The proposal is then weighed with the

existing system analytically and the best one is selected. The proposal is presented to

the user for an endorsement by the user. The proposal is reviewed on user request

and suitable changes are made. This is loop that ends as soon as the user is satisfied

with proposal. Preliminary study is the process of gathering and interpreting facts,

using the information for further studies on the system. Preliminary study is problem

solving activity that requires intensive communication between the system users and

system developers. It does various feasibility studies. In these studies a rough figure

of the system activities can be obtained, from which the decision about the strategies

to be followed for effective system study and analysis can be taken.

2.2 Existing System

Lack of security of data.

More man power.

Time consuming.

Consumes large volume of pare work.

Needs manual calculations.

No direct role for the higher officials.

2.3 Proposed System

8

CRIME FILE SYSTEM

The aim of proposed system is to develop a system of improved facilities. The

proposed system can overcome all the limitations of the existing system. The system

provides proper security and reduces the manual work.

Security of data.

Ensure data accuracy’s.

Proper control of the higher officials.

Minimize manual data entry.

Minimum time needed for the various processing.

Greater efficiency.

Better service.

User friendliness and interactive.

Minimum time required.

2.3.1. FEASIBILITY STUDY

Feasibility study is made to see if the project on completion will serve the purpose

of the organization for the amount of work, effort and the time that spend on it.

Feasibility study lets the developer foresee the future of the project and the

usefulness. A feasibility study of a system proposal is according to its workability,

which is the impact on the organization, ability to meet their user needs and

effective use of resources. Thus when a new application is proposed it normally goes

through a feasibility study before it is approved for development. The document

provide the feasibility of the project that is being designed and lists various areas

9

CRIME FILE SYSTEM

that were considered very carefully during the feasibility study of this project such

as Technical, Economic and Operational feasibilities. The following are its features:

A. TECHNICAL FEASIBILITY

The system must be evaluated from the technical point of view first. The

assessment of this feasibility must be based on an outline design of the system

requirement in the terms of input, output, programs and procedures. Having

identified an outline system, the investigation must go on to suggest the type of

equipment, required method developing the system, of running the system once it

has been designed.

Technical issues raised during the investigation are:

Does the existing technology sufficient for the

suggested one?

Can the system expand if developed?

The project should be developed such that the necessary functions and performance

are achieved within the constraints. The project is developed within latest

technology. Through the technology may become obsolete after some period of time,

due to the fact that never version of same software supports older versions, the

system may still be used. So there are minimal constraints involved with this project.

The system has been developed using Java the project is technically feasible for

development.

10

CRIME FILE SYSTEM

B. ECONOMIC FEASIBILITY

The developing system must be justified by cost and benefit. Criteria to ensure

that effort is concentrated on project, which will give best, return at the earliest. One

of the factors, which affect the development of a new system, is the cost it would

require.

The following are some of the important financial questions asked during

preliminary investigation:

The costs conduct a full system investigation.

The cost of the hardware and software.

The benefits in the form of reduced costs or fewer costly

errors.

Since the system is developed as part of project work, there is no manual cost to

spend for the proposed system. Also all the resources are already available, it give an

indication of the system is economically possible for development.

C. BEHAVIORAL FEASIBILITY

This includes the following questions:

Is there sufficient support for the users?

Will the proposed system cause harm?

The project would be beneficial because it satisfies the objectives when developed

and installed. All behavioral aspects are considered carefully and conclude that the

project is behaviorally feasible.

11

CRIME FILE SYSTEM

2.4 Data Flow Diagram

LEVEL 0 DFD

LEVEL 1 DFD

12

CRIME FILE SYSTEM

LEVEL 2 DFD

13

CRIME FILE SYSTEM

LEVEL 3 DFD

14

CRIME FILE SYSTEM

LEVEL 4 DFD

15

CRIME FILE SYSTEM

16

CRIME FILE SYSTEM

3. SYSTEM DESIGN

Introduction to System Design

Design is the first step into the development phase for any engineered product or

system. Design is a creative process. A good design is the key to effective system. The

term “design” is defined as “the process of applying various techniques and principles

17

CRIME FILE SYSTEM

for the purpose of defining a process or a system in sufficient detail to permit its

physical realization”. It may be defined as a process of applying various techniques

and principles for the purpose of defining a device, a process or a system in sufficient

detail to permit its physical realization. Software design sits at the technical kernel of

the software engineering process and is applied regardless of the development

paradigm that is used. The system design develops the architectural detail required

to build a system or product. As in the case of any systematic approach, this software

too has undergone the best possible design phase fine tuning all efficiency,

performance and accuracy levels. The design phase is a transition from a user

oriented document to a document to the programmers or database personnel.

System design goes through two phases of development: Logical and Physical Design.

3.1 Input design

The design of input focuses on controlling the amount of input required,

controlling the errors, avoiding delay, avoiding extra steps and keeping the process

simple. The input is designed in such a way so that it provides security and ease of

use with retaining the privacy. Input Design considered the following things:

What data should be given as input?

How the data should be arranged or coded?

The dialog to guide the operating personnel in providing input.

Methods for preparing input validations and steps to follow when error

occur.

3.2 Output Design

A quality output is one, which meets the requirements of the end user and

presents the information clearly. In output design it is determined how the

information is to be displaced for immediate need and also the hard copy output. It is

18

CRIME FILE SYSTEM

the most important and direct source information to the user. Efficient and intelligent

output design improves the system’s relationship to help user decision-making.

Designing computer output should proceed in an organized, well thought out

manner; the right output must be developed while ensuring that each output

element is designed so that people will find the system can use easily and effectively.

When analysis designs computer output, they should:

Identify the specific output that is needed to meet the requirements.

Select methods for presenting information.

Create document, report, or other formats that contain information

produced by the system.

3.3 Form design

Progress

19

CRIME FILE SYSTEM

Login

Add New User

20

CRIME FILE SYSTEM

Admin Complaint Status

Criminal Register

21

CRIME FILE SYSTEM

Delete User

Post mortem

22

CRIME FILE SYSTEM

Post mortem report

3.4 Database Design

23

CRIME FILE SYSTEM

A database is an organized mechanism that has the capability of storing

information through which a user can retrieve stored information in an effective and

efficient manner. The data is the purpose of any database and must be protected.

The database design is a two level process. In the first step, user requirements are

gathered together and a database is designed which will meet these requirements

as clearly as possible. This step is called Information Level Design and it is taken

independent of any individual DBMS.

In the second step, this Information level design is transferred into a design for

the specific DBMS that will be used to implement the system in question. This step is

called Physical Level Design, concerned with the characteristics of the specific DBMS

that will be used. A database design runs parallel with the system design. The

organization of the data in the database is aimed to achieve the following two major

objectives.

Data Integrity

Data independence

Normalization is the process of decomposing the attributes in an application, which

results in a set of tables with very simple structure. The purpose of normalization is to

make tables as simple as possible. Normalization is carried out in this system for the

following reasons.

To structure the data so that there is no repetition of data, this helps in

saving.

To permit simple retrieval of data in response to query and report

request.

To simplify the maintenance of the data through updates, insertions,

deletions.

To reduce the need to restructure or reorganize data which new

application requirements arise.

24

CRIME FILE SYSTEM

RELATIONAL DATABASE MANAGEMENT SYSTEM

(RDBMS):

A relational model represents the database as a collection of relations.

Each relation resembles a table of values or file of records. In formal relational model

terminology, a row is called a tuple, a column header is called an attribute and the

table is called a relation. A relational database consists of a collection of tables, each

of which is assigned a unique name. A row in a tale represents a set of related values.

RELATIONS, DOMAINS & ATTRIBUTES:

A table is a relation. The rows in a table are called tuples. A tuple is an ordered set of

n elements. Columns are referred to as attributes. Relationships have been set

between every table in the database. This ensures both Referential and Entity

Relationship Integrity. A domain D is a set of atomic values. A common method of

specifying a domain is to specify a data type from which the data values forming the

domain are drawn. It is also useful to specify a name for the domain to help in

interpreting its values. Every value in a relation is atomic, that is not decomposable.

RELATIONSHIPS:

Table relationships are established using Key. The two main keys of prime

importance are Primary Key & Foreign Key. Entity Integrity and Referential Integrity

Relationships can be established with these keys. Entity Integrity enforces that no

Primary Key can have null values. Referential Integrity enforces that no Primary Key

can have null values.

Referential Integrity for each distinct Foreign Key value, there must

exist a matching Primary Key value in the same domain. Other key are

Super Key and Candidate Keys.

Relationships have been set between every table in the database. This

ensures both Referential and Entity Relationship Integrity.

25

CRIME FILE SYSTEM

NORMALIZATION:

As the name implies, it denoted putting things in the normal form. The application

developer via normalization tries to achieve a sensible organization of data into

proper tables and columns and where names can be easily correlated to the data by

the user. Normalization eliminates repeating groups at data and thereby avoids data

redundancy which proves to be a great burden on the computer resources. These

include:

Normalize the data.

Choose proper names for the tables and columns.

Choose the proper name for the data.

First Normal Form:

The First Normal Form states that the domain of an attribute must include only

atomic values and that the value of any attribute in a tuple must be a single value

from the domain of that attribute. In other words 1NF disallows “relations within

relations” or “relations as attribute values within tuples”. The only attribute values

permitted by 1NF are single atomic or indivisible values.

The first step is to put the data into First Normal Form. This can be donor by moving

data into separate tables where the data is of similar type in each table. Each table

is given a Primary Key or Foreign Key as per requirement of the project. In this we

form new relations for each nonatomic attribute or nested relation. This eliminated

repeating groups of data.

A relation is said to be in first normal form if only if it satisfies the constraints that

contain the primary key only.

26

CRIME FILE SYSTEM

Second Normal Form: According to Second Normal Form, For relations

where primary key contains multiple attributes, no non key attribute should

be functionally dependent on a part of the primary key.

In this we decompose and setup a new relation for each partial key with its

dependent attributes. Make sure to keep a relation with the original primary key

and any attributes that are fully functionally dependent on it. This step helps in

taking out data that is only dependant on apart of the key.

A relation is said to be in second normal form if and only if it satisfies all the first

normal form conditions for the primary key and every non-primary key attributes of

the relation is fully dependent on its primary key alone.

Third Normal Form: According to Third Normal Form, Relation should not have a

non key attribute functionally determined by another non key attribute or by a set

of Non key attributes. That is, there should be no transitive dependency on the

primary key. In this we decompose and set up relation that includes the non key

attributes that functionally determines other non key attributes. This step is taken

to get rid of anything that does not depend entirely on the Primary Key. A relation is

said to be in third normal form if only if it is in second normal form and more over

the non key attributes of the relation should not be depend on other non key

attribute.

27

CRIME FILE SYSTEM

Table Design

Table: Admin Login

Table: Charge Sheet

Table: Complaint Reg

Table: Complaint

28

CRIME FILE SYSTEM

Table: Criminal reg

Table: Most Wanted

Table: History

29

CRIME FILE SYSTEM

Table: Prisoners Reg

Table: Prisoners Temp

Table: Post Mortem

30

CRIME FILE SYSTEM

Table: FIR

31

CRIME FILE SYSTEM

4 SYSTEM IMPLEMENTATION

32

CRIME FILE SYSTEM

4.1 About Language

The Control Properties

Before writing an event procedure for the control to response to a user's input, you

have to set certain properties for the control to determine its appearance and how it

will work with the event procedure. You can set the properties of the controls in the

properties window or at runtime.

Handling some of the common controls

The Text Box

The text box is the standard control for accepting input from the user as well as to

display the output. It can handle string (text) and numeric data but not images or

pictures. String in a text box can be converted to a numeric data by using the

function Val(text). The following example illustrates a simple program that processes

the input from the user.

Example

In this program, two text boxes are inserted into the form together with a few labels.

The two text boxes are used to accept inputs from the user and one of the labels will

be used to display the sum of two numbers that are entered into the two text boxes.

33

CRIME FILE SYSTEM

Besides, a command button is also programmed to calculate the sum of the two

numbers using the plus operator. The program use creates a variable sum to accept

the summation of values from text box 1 and text box 2.The procedure to calculate

and to display the output on the label is shown below. The output is shown in Figure

3.2

Private Sub Command1_Click ()

‘To add the values in text box 1 and text box 2

Sum = Val (Text1.Text) + Val (Text2.Text)

‘To display the answer on label 1

Label1.Caption = Sum

End Sub

Figure

The Label

The label is a very useful control for Visual Basic, as it is not only used to provide

instructions and guides to the users, it can also be used to display outputs. One of its

most important properties is Caption. Using the syntax label.Caption, it can display

34

CRIME FILE SYSTEM

text and numeric data . You can change its caption in the properties window and also

at runtime. Please refer to Example 3.1 and Figure 3.1 for the usage of label.

The Command Button

The command button is one of the most important controls as it is used to execute

commands. It displays an illusion that the button is pressed when the user click on it.

The most common event associated with the command button is the Click event, and

the syntax for the procedure is

Private Sub Command1_Click ()

Statements

End Sub

The Picture Box

The Picture Box is one of the controls that is used to handle graphics. You can load a

picture at design phase by clicking on the picture item in the properties window and

select the picture from the selected folder. You can also load the picture at runtime

using the LoadPicture method. For example, the statement will load the picture

grape.gif into the picture box.

Picture1.Picture=LoadPicture ("C:\VB program\Images\grape.gif")

You will learn more about the picture box in future lessons. The image in the picture

box is not resizable.

The Image Box

35

CRIME FILE SYSTEM

The Image Box is another control that handles images and pictures. It functions

almost identically to the picture box. However, there is one major difference, the

image in an Image Box is stretchable, which means it can be resized. This feature is

not available in the Picture Box. Similar to the Picture Box, it can also use the

LoadPicture method to load the picture. For example, the statement loads the

picture grape.gif into the image box.

Image1.Picture=LoadPicture ("C:\VB program\Images\grape.gif")

The List Box

The function of the List Box is to present a list of items where the user can click and

select the items from the list. In order to add items to the list, we can use the

AddItem method. For example, if you wish to add a number of items to list box 1,

you can key in the following statements

Example

Private Sub Form_Load ( )

List1.AddItem “Lesson1”

List1.AddItem “Lesson2”

List1.AddItem “Lesson3”

List1.AddItem “Lesson4”

End Sub

The items in the list box can be identified by the ListIndex property, the value of the

ListIndex for the first item is 0, the second item has a ListIndex 1, and the second

item has a ListIndex 2 and so on

36

CRIME FILE SYSTEM

The Combo Box

The function of the Combo Box is also to present a list of items where the user can

click and select the items from the list. However, the user needs to click on the small

arrowhead on the right of the combo box to see the items which are presented in a

drop-down list. In order to add items to the list, you can also use the AddItem

method. For example, if you wish to add a number of items to Combo box 1, you can

key in the following statements

Example

Private Sub Form_Load ( )

Combo1.AddItem “Item1”

Combo1.AddItem “Item2”

Combo1.AddItem “Item3”

Combo1.AddItem “Item4”

End Sub

The Check Box

The Check Box control lets the user selects or unselects an option. When the Check

Box is checked, its value is set to 1 and when it is unchecked, the value is set to 0.

You can include the statements Check1.Value=1 to mark the Check Box and

Check1.Value=0 to unmark the Check Box, as well as use them to initiate certain

actions. For example, the program will change the background color of the form to

red when the check box is unchecked and it will change to blue when the check box

is checked. You will learn about the conditional statement if….Then….Elesif in later

37

CRIME FILE SYSTEM

lesson. VbRed and vbBlue are color constants and Back Color is the background color

property of the form.

The Option Box

The Option Box control also lets the user selects one of the choices. However, two or

more Option Boxes must work together because as one of the Option Boxes is

selected, the other Option Boxes will be unselected. In fact, only one Option Box can

be selected at one time. When an option box is selected, its value is set to “True” and

when it is unselected; its value is set to “False”. In the following example, the shape

control is placed in the form together with six Option Boxes. When the user clicks on

different option boxes, different shapes will appear. The values of the shape control

are 0, 1, and 2,3,4,5 which will make it appear as a rectangle, a square, an oval

shape, a rounded rectangle and a rounded square respectively.

Example

Private Sub Option1_Click ( )

Shape1.Shape = 0

End Sub

Private Sub Option2_Click()

Shape1.Shape = 1

End Sub

Private Sub Option3_Click()

38

CRIME FILE SYSTEM

Shape1.Shape = 2

End Sub

Private Sub Option4_Click()

Shape1.Shape = 3

End Sub

Private Sub Option5_Click()

Shape1.Shape = 4

End Sub

Private Sub Option6_Click()

Shape1.Shape = 5

End Sub

The Drive List Box

The Drive ListBox is for displaying a list of drives available in your computer. When

you place this control into the form and run the program, you will be able to select

different drives from your computer as shown in Figure 3.3

The Directory List Box

The Directory List Box is for displaying the list of directories or folders in a selected

drive. When you place this control into the form and run the program, you will be

able to select different directories from a selected drive in your computer as shown

in Figure 3.4

The File List Box

39

CRIME FILE SYSTEM

The File List Box is for displaying the list of files in a selected directory or folder.

When you place this control into the form and run the program, you will be able to

shown the list of files in a selected directory as shown in Figure

You can coordinate the Drive List Box, the Directory List Box and the File List Box to

search for the files you want. The procedure will be discussed in later lessons.

MS ACCESS 2003

Microsoft Access is a powerful program to create and manage your databases. It has many

built in features to assist you in constructing and viewing your information. Access is much

more involved and is a more genuine database application than other programs such as

Microsoft Works. The keywords involved in the process are: Database File, Table, Record,

Field, and Data-type. Here is the Hierarchy that Microsoft Access uses in breaking down a

database.

Database File: This is your main file that encompasses the entire database and that is saved

to your hard-drive or floppy disk.

Example: StudentDatabase.mdb

40

CRIME FILE SYSTEM

Table:A table is a collection of data about a specific topic. There can be multiple tables in a

database.

Field: Fields are the different categories within a Table. Tables usually contain multiple

fields.

Datatypes: Datatypes are the properties of each field. A field only has 1 datatype.

FieldName) Student LastName

Datatype) Text

Starting Microsoft Access

Two Ways

1. Double click on the Microsoft Access icon on the desktop.

2. Click on Start --> Programs --> Microsoft Access

41

CRIME FILE SYSTEM

Creating New, and Opening Existing Databases

The above picture gives you the option to:

Create a New Database from scratch

Use the wizard to create a New Database

Open an existing database

42

CRIME FILE SYSTEM

o The white box gives you the most recent databases you have used. If

you do not see the one you had created, choose the More Files option

and hit OK. Otherwise choose the database you had previously used

and click OK.

4.2 System Configuration

HARDWARE REQUIREMENTS

Processor : X86 Compatible processor

With 1.7 GHz Clock speed

RAM : 512 MB or more

Hard disk : 20 GB or more

Monitor : VGA/SVGA

Keyboard : 104 Keys

Mouse : 2 buttons/ 3 buttons

43

CRIME FILE SYSTEM

SOFTWARE REQUIREMENTS

Operating System : Windows 2000/XP

Front end : Visual Basic 6.0

Back end : MS ACCESS

5. APPENDIX

44

CRIME FILE SYSTEM

5.1 Source Code

Add Complaint

Private Sub cmdAdd_Click()If (cmbComplntNo.Text = "" Or txtStatus.Text = "") Then MsgBox "Missing Fields", vbInformation, "CFS"Elsecon.Execute ("insert into ComplntStatus values(" + cmbComplntNo.Text + ",'" + txtStatus.Text + "')")MsgBox "Status Added Successfully", vbInformation, "Crime File System"txtDetails.Text = ""txtStatus.Text = ""cmbComplntNo.SetFocusEnd IfEnd Sub

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdDetails_Click()Set rs = con.Execute("select Details from ComplaintReg where ComplntNo=" + cmbComplntNo.Text + "")

45

CRIME FILE SYSTEM

If (Not rs.EOF) Then txtDetails.Text = rs(0) txtStatus.SetFocusEnd If

End Sub

Private Sub Form_Load()connectdbSet rs = con.Execute("select ComplntNo from ComplaintReg")While (Not rs.EOF) cmbComplntNo.AddItem rs(0) rs.MoveNextWendrs.CloseEnd Sub

Add user

Private Sub Form_Load()connectdbEnd SubPrivate Sub cmdAdd_Click()Set rs = con.Execute("select * from UserLogin where Username='" + txtUsername.Text + "' and Password='" + txtPassword.Text + "'")If (Not rs.EOF) Then MsgBox "Sorry!! User already exists. Try another username", vbCritical, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocusElse con.Execute ("insert into UserLogin values('" + txtUsername.Text + "','" + txtPassword.Text + "')") MsgBox "User added sucessfully", vbInformation, "Crime File System" txtPassword.Text = "" txtUsername.Text = "" txtUsername.SetFocusEnd IfEnd Sub

46

CRIME FILE SYSTEM

Private Sub cmdCancel_Click()Unload Me

FIR Report

Dim x As IntegerPrivate Sub cmdShRpt_Click()x = cmbMno.Text If (DataEnvironment1.rsCommand4.State = 1) Then DataEnvironment1.rsCommand4.Close Else DataEnvironment1.Command4 (x) Load DataReportFIR DataReportFIR.Show End IfEnd Sub

Private Sub Form_Load()connectdbSet rs = con.Execute("select Firno from FIR")While (Not rs.EOF) cmbMno.AddItem rs(0) rs.MoveNextWendEnd Sub

Login

Private Sub cmdAdminLog_Click()Set rs = con.Execute("Select * from AdminLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'")If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuAdminAddU.Enabled = True frmMDI.mnuAdminDelU.Enabled = True frmMDI.mnuActiv.Enabled = True

47

CRIME FILE SYSTEM

frmMDI.mnuLogin.Enabled = False frmMDI.mnuAdminAddComSt.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True Unload MeElse MsgBox "Failure", vbCritical, "Crime File System"End If'rs.CloseUnload MeEnd Sub

Private Sub cmdCancel_Click()Unload MeEnd Sub

Private Sub cmdUserLog_Click()Set rs = con.Execute("Select * from UserLogin where Username='" + txtUname.Text + "' and Password='" + txtPass.Text + "'")If (Not rs.EOF) Then MsgBox "Login Success", vbInformation, "Crime File System" frmMDI.mnuLogoff.Enabled = True frmMDI.mnuLogin.Enabled = False

frmMDI.mnuActiv.Enabled = True frmMDI.mnuActivReg.Enabled = True frmMDI.mnuActivComp.Enabled = True frmMDI.mnuActivRpt.Enabled = True Unload MeElse MsgBox "Failure", vbCritical, "Crime File System"End If'rs.Close

End Sub

Private Sub Form_Load()connectdbEnd Sub

Private Sub Form_Unload(Cancel As Integer)

48

CRIME FILE SYSTEM

con.CloseEnd Sub

Post Mortem Report

Dim x As IntegerPrivate Sub cmdShRpt_Click() x = cmbMno.Text If (DataEnvironment1.rsCommand3.State = 1) Then DataEnvironment1.rsCommand3.Close Else DataEnvironment1.Command3 (x) Load DataReportmortem DataReportmortem.Show End If End Sub

Private Sub Form_Load()connectdbSet rs = con.Execute("select PMortemNo from Postmortem")While (Not rs.EOF) cmbMno.AddItem rs(0) rs.MoveNextWendEnd Sub

Splash

Dim i As IntegerDim x As IntegerOption Explicit

Private Sub Form_Load()File1.FileName = App.Pathx = File1.ListCountEnd Sub

49

CRIME FILE SYSTEM

Private Sub Form_MouseDown(Button As Integer, Shift As Integer, x As Single, Y As Single)Unload MeEnd Sub

Private Sub Form_Unload(Cancel As Integer)Load frmMDIfrmMDI.Show

End Sub

Private Sub Frame1_MouseDown(Button As Integer, Shift As Integer, x As Single, Y As Single)Unload MeEnd Sub

Private Sub Timer1_Timer()If (Image1.Left <= 6480) Then Image1.Left = Image1.Left + 100Else Image1.Left = 0End IfIf (i <= x) ThenLabel2.Caption = File1.List(i)i = i + 1ElseLoad frmMDIfrmMDI.ShowUnload MeEnd IfEnd Sub

50

CRIME FILE SYSTEM

9. IMPLEMENTATION AND TESTING

51

CRIME FILE SYSTEM

Testing is a process of executing a program with the interest of finding an error. A good test is one that has high probability of finding the yet undiscovered error. Testing should systematically uncover different classes of errors in a minimum amount of time with a minimum amount of efforts. Two classes of inputs are provided to test the process

1. A software configuration that includes a software requirement

specification, a design specification and source code.

2. A software configuration that includes a test plan and procedure, any

testing tool and test cases and their expected results.

Testing is divided into several distinct operations:

1. Unit Testing

Unit test comprises of a set tests performed by an individual program prior to

the integration of the unit into large system. A program unit is usually the smallest

free functioning part of the whole system. Module unit testing should be as

52

CRIME FILE SYSTEM

exhaustive as possible to ensure that each representation handled by each module

has been tested. All the units that makeup the system must be tested independently

to ensure that they work as required. During unit testing some errors were raised and

all of them were rectified and handled well. The result was quiet satisfactory and it

worked well.

2. Integration Testing

Integration testing is a system technique for constructing the program

structure while at the same time conducting tests to uncover errors associated with

interfacing. The objective is to take unit tested modules and build a program

structure that has been dictated by design. Bottom-up integration is the traditional

strategy used to integrate the components of a software system into functioning

whole. Bottom-up integration consists of unit test followed by testing of the entire

system. A sub-system consists of several modules that communicated with other

defined interface.

The system was done the integration testing. All the modules were tested for

their compatibility with other modules .They test was almost successful. All the

modules coexisted very well, with almost no bugs. All the modules were

encapsulated very well so as to not hamper the execution of other modules.

3. Validation Testing

After validation testing, software is completely assembled as a package,

interfacing errors that have been uncovered and corrected and the final series of

software test; the validation test begins. Steps taken during software design and

53

CRIME FILE SYSTEM

testing can greatly improve the probability of successful integration in the larger

system. System testing is actually a series of different tests whose primary purpose is

to fully exercise the compute –based system.

4. Recovery Testing

It is a system that forces the software to fail in a variety of ways and verifies

that the recovery is properly performed.

5. Security Testing

It attempts to verify that protection mechanisms built into a system will in fact

protect it from improper penetration. The system’s security must of course be tested

from in vulnerability form frontal attack.

6. Stress Testing

Stress tools are designed to confront programs with abnormal situations.

Stress testing executes a system in a manner that demands resources in abnormal

quantity and volume.

7. Black Box Testing

Black box testing is done to find out the following information as shown

in below:

1. Incorrect or missing functions.

2. Interface errors.

3. Errors or database access.

4. Performance error.

5. Termination error.

54

CRIME FILE SYSTEM

The mentioned testing is carried out successfully for this

application according to the user’s requirement specification.

8. Test Data Output

After preparing test data, the system under study is tested using the test data.

While testing the system using test data, errors are again uncovered and corrected by

using above testing and corrections are also noted for future use.

7. FUTURE ENHANCEMENT

We can update this system as online application

The main advantage of online application is that, a person can report

the crime anytime from anywhere.

Users can view the progress of their complaint online.

By the future technology user can view the case details and progress of

the complaints on their mobile phones

Face recognition technology can apply. User or witness of the crime can

give the physical information of the thief.

55

CRIME FILE SYSTEM

8. CONCLUSION

CRIME FILE MANAGEMENT SYSTEM initiates the objective of providing the user

with customized and powerful complaint registration and process management

system side software. The software is built with all options such as complaint

registration, prisoner’s registration, and postmortem report generation etc…All the

requirements specified during the analysis and design phase are fully met, thus

resulting in the formation of good software. The interface provided is very user

friendly and flexible for all times.

56

CRIME FILE SYSTEM

9. BIBLIOGRAPHY

Books

A Complete Guide to Programming in Visual Basic .Net

A Complete Visual Basic 6 Training Course: How to Programme:

Package

Advanced Programming Using Visual Basic: Version 6.0

Access 2003 Power Programming with VBA

Advanced MS Visual Basic

Site Address

www.visualbasic.freetutes.com

www.msdn.microsoft.com

57

CRIME FILE SYSTEM

58